General

  • Target

    2792-67-0x0000000000D50000-0x0000000001328000-memory.dmp

  • Size

    5.8MB

  • Sample

    241122-weh9msvnfx

  • MD5

    ad005c6ed8e07b1e2b3aeb158ddda260

  • SHA1

    5d4b73eb38cfd640ebee5e651c1575d1f082a4df

  • SHA256

    0ccf134b4bd385030bc47862ca0a35bf9f517da8371687aad3562c0b2038a57b

  • SHA512

    0356ad7ab458baadf01f0d0cab9a8b9396668e0f68642b13de028f2fe66f01d8ff1dd6ee74a363a6b6991a1f9edb80041b6fa59aca7ad4c748b965721c2549c2

  • SSDEEP

    24576:pDdUzMZpOCnY7p4dtQW/AaPDW9GX7aNdsSqgjHXAS+YEGWEFU0eCypUwQ8siK3hv:R6QISlPa9w2ywX8vEpe3pUld3awx/OG

Malware Config

Extracted

Family

stealc

Botnet

sila

C2

http://85.28.47.31

Attributes
  • url_path

    /5499d72b3a3e55be.php

Targets

    • Target

      2792-67-0x0000000000D50000-0x0000000001328000-memory.dmp

    • Size

      5.8MB

    • MD5

      ad005c6ed8e07b1e2b3aeb158ddda260

    • SHA1

      5d4b73eb38cfd640ebee5e651c1575d1f082a4df

    • SHA256

      0ccf134b4bd385030bc47862ca0a35bf9f517da8371687aad3562c0b2038a57b

    • SHA512

      0356ad7ab458baadf01f0d0cab9a8b9396668e0f68642b13de028f2fe66f01d8ff1dd6ee74a363a6b6991a1f9edb80041b6fa59aca7ad4c748b965721c2549c2

    • SSDEEP

      24576:pDdUzMZpOCnY7p4dtQW/AaPDW9GX7aNdsSqgjHXAS+YEGWEFU0eCypUwQ8siK3hv:R6QISlPa9w2ywX8vEpe3pUld3awx/OG

MITRE ATT&CK Enterprise v15

Tasks